Patent application number | Description | Published |
20080215558 | SYSTEM FOR MANAGING CONFIGURATION CHANGES IN A DATA PROCESSING SYSTEM - A method of managing configuration changes in a data processing system, particularly a network wherein software products ( | 09-04-2008 |
20080228889 | METHOD, SYSTEM AND COMPUTER PROGRAM PRODUCT FOR DISTRIBUTING SOFTWARE BASED ON AN E-MAIL SERVICE - A solution for distributing software products is proposed. Typically, a software distribution infrastructure controls the deployment of software packages to selected endpoints; each software package includes commands and resource images, which are used to install a corresponding software product. For this purpose, an e-mail service is exploited. Particularly, a new e-mail message is created for each software package to be deployed; the software package is embedded into the e-mail message as an attachment and tags for controlling the software distribution process (such as a desired target state of the software package) are inserted into its body section. A plug-in of a mail client on each endpoint receives that e-mail message; the software package is then extracted and passed to an application engine, which controls its application according to the target state indicated by the corresponding control tag. | 09-18-2008 |
20080228902 | Configuring processing entities according to their roles in a data processing system with a distributed architecture - A mechanism is provided for configuring different computers of a network. Each computer plays a specific physic role (defined by an architecture of the network) and/or a specific logic role (defined by the applications running in the network). A reference model and a transition table are associated with each product to be installed in the network; the reference model specifies a target configuration for each role (defined by the components of the product to be installed), while the transition table specifies the actions required to reach each target configuration from each current configuration of the computers. A server identifies the role and the current configuration of each computer; the actions required to enforce the desired target configuration on the computer are then established and executed. | 09-18-2008 |
20090248636 | METHOD FOR GENERATING A ROBUST SOFTWARE SIGNATURE - A method and a corresponding system and computer-usable medium for discovering software products on a plurality of one or more computers. The discovering method, system and/or computer-usable medium can populate a software catalogue without the manual intervention of an administrator. Such an approach reduces the cost of producing and maintaining a comprehensive knowledge base (e.g., the catalogue), which contains definitions of software products and the related signature. Signature definitions combine information obtained by the data gathering process and information contained in the registries. This combination allows the creation of a robust signature which reduces to a great extent the possibilities of both “false positive” and “false negative” results. | 10-01-2009 |
20090257596 | Managing Document Access - Methods, computer program products and systems for protecting a document from access by one or more users based on one or more document access rules. In one embodiment, the method includes creating a data set representing the one or more document access rules, storing the document and the associated data set, determining and storing a key for opening the document when one or more document access rules from the data set are met, and releasing the key to open the document to one or more users in response to a request from a user which meets one or more document access rules, thereby enabling the user to access the document. | 10-15-2009 |
20090319951 | Aggregating Service Components - Methods, systems, and computer program products for aggregating service components in a data processing system according to predefined aggregation rules. The method includes providing a plurality of visual elements, each visual element representing a corresponding service component; selecting a new visual element for addition to an aggregation structure; determining a set of eligible visual elements of eligible service components among the instantiated service components; associating a visual cue with the eligible visual elements; and aggregating the new service component to a selected eligible service component in the aggregation structure. The new service component is compatible for aggregation with each eligible service component according to the aggregation rules. The aggregation structure includes an aggregation of instantiated visual elements of instantiated service components to define an aggregated service according to the aggregation of the instantiated service components. | 12-24-2009 |
20100005516 | METHOD AND SYSTEM FOR SECURE AGENT-LESS ENTERPRISE INFRASTRUCTURE DISCOVERY - A method and system for securing dynamic discovery of an enterprise computing infrastructure is provided. One implementation involves maintaining enterprise credential information in a secured trust store, receiving an access request through a secure connection for access to a remote infrastructure component, determining the type of the access request, for a root-level type access request, responding to the request via the secure connection with enterprise root credentials from the trust store, and for an unprivileged type access request, responding to the request via the secure connection with unprivileged access enterprise credentials from the trust store. | 01-07-2010 |
20110093957 | METHOD AND SYSTEM FOR ADMINISTERING A SECURE DATA REPOSITORY - A method, system and computer program product for administering a secure data repository. Rather than using a specific database, an application may use an existing hierarchical file structure, such as provided by conventional operating systems, to store structured data in a number of files. To detect unauthorized, malicious or inadvertent changes to these files, either within one or more files, or by deletion, replacement or movement of files in their entirety, each file incorporates a last change timestamp and the contents of the file are digitally signed. Furthermore, every file in the secure repository is logged in an index file together with its respective change date stamp, and the index file as a whole is also digitally signed. Unauthorized changes can be identified by comparison of the file date stamps with the content of the index as well as verifying the validity of each digital signature. | 04-21-2011 |
20110154329 | METHOD AND SYSTEM FOR OPTIMIZING VIRTUAL STORAGE SIZE - A method, system and computer program product for optimizing virtual storage in a virtual computer system including at least one virtual machine, each virtual machine being associated with one or more virtual disks. A target set of virtual machines among the virtual machines comprised in the virtual computer system is determined based on information related to the virtual machines and on shrinking constraints. For each virtual machine in the target set of virtual machines, each virtual disk associated with the virtual machine is identified. Furthermore, for each virtual disk associated with the virtual machine, the following occurs: the virtual disk is analyzed, a virtual disk saving quantity based on the virtual disk analysis is estimated, a resized virtual disk based on the estimated virtual disk saving quantity is generated, and the current virtual disk is replaced with the resized virtual disk. | 06-23-2011 |
20120131577 | PROVIDING A VIRTUAL MACHINE - A software element database stores software element definitions according to a software element hierarchy. A score is assigned to at least one of the software element based at least in part upon the software element's hierarchy level. Further, virtual machine templates are stored in a library. The virtual machine templates include at least one software element associated with a software element from the software element database. A user enters a specification that specifies desired software elements to be included in the virtual machine via a user interface. After the specification is entered, the a score value is calculated for at least one virtual machine template from the library, based on the scores assigned to the software elements. Using the calculated score, the virtual machine template having the highest score value is selected and the selected virtual machine template is delivered as the virtual machine to a hypervisor. | 05-24-2012 |
20120159332 | METHOD AND SYSTEM FOR DYNAMIC PRESENTATIONS MANAGEMENT - A method for dynamic presentations management of electronic presentations including multiple slides, wherein each slide has at least one presentation constraint parameter assigned thereto, and wherein a presentation software is used for generating and displaying the presentation can include gathering metadata regarding the presentation by the presentation software, evaluating the metadata regarding the presentation and determining at least one presentation constraint parameter by the presentation software, and automatically arranging and/or selecting slides and/or modifying a content of slides according to the determined at least one presentation constraint parameter to be presented by use of the presentation software. | 06-21-2012 |
20120159485 | OPTIMIZING VIRTUAL STORAGE SIZE - A method, system and computer program product for optimizing virtual storage in a virtual computer system including at least one virtual machine, each virtual machine being associated with one or more virtual disks. A target set of virtual machines among the virtual machines comprised in the virtual computer system is determined based on information related to the virtual machines and on shrinking constraints. For each virtual machine in the target set of virtual machines, each virtual disk associated with the virtual machine is identified. Furthermore, for each virtual disk associated with the virtual machine, the following occurs: the virtual disk is analyzed, a virtual disk saving quantity based on the virtual disk analysis is estimated, a resized virtual disk based on the estimated virtual disk saving quantity is generated, and the current virtual disk is replaced with the resized virtual disk. | 06-21-2012 |
20120216181 | AUTOMATIC UPGRADE OF VIRTUAL APPLIANCES - A software application distributed as a virtual appliance is automatically installed, updated and removed in a virtual machine system running on top of a virtual machine monitor in a computer. The software application virtual appliance comprises a virtual disk, which is automatically detected and installed or removed at the customer by a virtual disk activation manager program, which executes scripts including commands through an API to the virtual machine monitor. The virtual appliance virtual disk is also created automatically by the software manufacturing using the virtual disk activation manager program. The virtual appliance virtual disk stores the binaries of the software application, a software package created by the software manufacturer using a software package tool, an installer to execute the software package, installation and un-installation scripts and a unique identifier which is a signature for the virtual machine virtual disk. | 08-23-2012 |
20120216199 | PROVIDING A VIRTUAL MACHINE - A software element database stores software element definitions according to a software element hierarchy. A score is assigned to at least one of the software element based at least in part upon the software element's hierarchy level. Further, virtual machine templates are stored in a library. The virtual machine templates include at least one software element associated with a software element from the software element database. A user enters a specification that specifies desired software elements to be included in the virtual machine via a user interface. After the specification is entered, the a score value is calculated for at least one virtual machine template from the library, based on the scores assigned to the software elements. Using the calculated score, the virtual machine template having the highest score value is selected and the selected virtual machine template is delivered as the virtual machine to a hypervisor. | 08-23-2012 |
20120246647 | MANAGING SOFTWARE CONTENT IN VIRTUAL DESKTOP ENVIRONMENTS - Software is managed in a virtual desktop environment by discovering virtual appliances contained in the virtual desktop environment, and for each virtual appliance discovering the virtual machines belonging to the virtual appliance. Software is further managed by discovering the standalone virtual machines comprised in the virtual desktop environment, and for each discovered virtual machine, introspecting each virtual machine to detect non-virtual applications and virtualized applications running in the virtual machine. For each detected application, identification is made of the operating system on which the application is running | 09-27-2012 |
20120278612 | Authenticating Digitally Encoded Products without Private Key Sharing - A method and a corresponding system for authenticating software products are proposed. A digital certificate and a corresponding private key required to sign each product are stored on a server computer. Whenever a user needs to sign a product, he/she logs on a client computer and transmits a corresponding request to the server computer. The server computer verifies whether the request has been received from an authorized subject; for example, an address of the client computer and an identifier of the user are compared with a predefined list. If the result of the verification is positive, the product is signed and returned to the client computer. For this purpose, a script called on the server computer includes either an instruction passing the access password to a signing tool as a parameter or an instruction causing the signing tool to import the access password from a registry of the server computer. | 11-01-2012 |
20120297063 | METHOD AND APPARATUS FOR POPULATING A SOFTWARE CATALOGUE WITH SOFTWARE KNOWLEDGE GATHERING - A method and a corresponding apparatus for inventoring software products on a plurality of computer are proposed. The inventoring system aims at populating a software catalogue without the manual intervention of an administrator. The present invention reduces the cost of producing and maintaining a comprehensive knowledge base (the catalogue) which contains definitions of software products and the related signature. Information about software products and their related signature is obtained through a process which gathers information from a potentially very large collection of computers. Any occurrence of a group of identical files across multiple computers is considered a reliable indicator that they belong to the installation footprint of a product. | 11-22-2012 |
20130091498 | MAINTENANCE OF VIRTUAL APPLIANCES - Maintenance of a virtual appliance is provided. The virtual appliance comprises a set of software components each one installed on a corresponding virtual machine. A maintenance descriptor is provided comprising an indication of a new level of at least each one of the software components to be updated thereto. For each software component indicated in the maintenance descriptor, a current level is determined of the software component that is installed on the corresponding virtual machine. A set of old ones of the software components to be actually updated is determined according to a comparison between the corresponding current levels and new levels. The virtual appliance is then cloned. The cloned virtual appliance is updated by updating each old software component thereof to the new level. The virtual appliance is now replaced by the updated cloned virtual appliance. | 04-11-2013 |
20130346548 | MANAGEMENT OF MOBILE DEVICES LEVERAGING LOCATION BASED COOPERATION - A solution is proposed for managing a plurality of data processing mobile devices. A corresponding method comprises the step of downloading management data onto each one of the mobile devices for application thereof on the mobile device, wherein for at least a first one of the mobile devices the management data is downloaded from a data processing central system, each mobile device wherein the management data has already been downloaded defining an inclusive mobile device; in the solution according to an embodiment of the invention, the step of downloading management data comprises electing a set of inclusive mobile devices temporarily as service mobile devices according to characteristic information of the inclusive mobile devices being based at least on a current position thereof, and causing at least a second one of the mobile devices to download the management data from a selected one of the service mobile devices in proximity thereof. | 12-26-2013 |
20150039875 | Deployment of Software Images with Distinct Configuration Logic - A solution for deploying a software image comprising a target operating system on a target computing machine is proposed. A corresponding method comprises mounting the software image as a storage device, identifying each software program comprised in the software image, downloading a configuration logic for configuring each software program, applying each configuration logic against the software image, and booting the target computing machine from the target operating system. | 02-05-2015 |